mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a repository can make that same file appear trusted and then reach dangerous directives such as [env] _.source, templates, hooks, or tasks.
References
| Link | Resource |
|---|---|
| https://github.com/jdx/mise/security/advisories/GHSA-436v-8fw5-4mj8 | Vendor Advisory Exploit |
Configurations
History
15 Apr 2026, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jdx/mise/security/advisories/GHSA-436v-8fw5-4mj8 - Vendor Advisory, Exploit | |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:jdx:mise:*:*:*:*:*:rust:*:* | |
| First Time |
Jdx
Jdx mise |
07 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 21:17
Updated : 2026-04-15 20:33
NVD link : CVE-2026-35533
Mitre link : CVE-2026-35533
CVE.ORG link : CVE-2026-35533
JSON object : View
Products Affected
jdx
- mise
CWE
